The bring your own computer (BYOC) acceptable use policy establishes minimum requirements for devices, communicates stopped amounts and rides, and outlines the desktop support agreement changes for both software and hardware. This policy is designed to maximize the privacy and confidentiality of business data, while allowing employees to use their own devices.

Risks addressed by the policy:

  • Not having a BYOC policy allows for overall control of a company's data to be lost.
  • Data will be unorganized and range in unidentified levels of protection.

Related Content

Hide Details

Search Code: 40901
Published: March 16, 2011
Last Revised: November 19, 2015


  • Missing comment
    Ajit Ghai | 03-07-2016

    Why not expand the abbreviation to Bring Your Own Computer? A Google search on BYOC yields: Bring or Build your own Cloud, or Clone etc.

    • 432c05244a845caaca3b276adb15a11e comment
      Info-Tech Research Group | 03-14-2016

      Thanks for the suggestion. It can definitely be difficult to keep up with the every-growing set of acronyms we deal with. We are currently working on a new “BYOE” (bring your own everything) blueprint, in which we will be better defining all the different variations on “BYO,” and exploring how they all fit together today. For example, the acronym BYOD has shifted in definition in recent months; it used to refer mostly to mobile devices, but seems to be used interchangeably with BYOC (i.e., non-mobile computers) more and more. Stay tuned for more research on this.


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019